大工至善|大学至真分享 http://blog.sciencenet.cn/u/lcj2212916

博文

[转载]【电信学】【2015.05】物联网认证研究

已有 1479 次阅读 2019-5-23 22:18 |系统分类:科研笔记|文章来源:转载


本文为印度Rourkela国立技术研究院作者:Mente Sindhu)的硕士论文60

 

物联网(IoT)是一种快速发展的技术在当前无所不在的计算领域日益重要这一概念背后的主要目的是为我们周围的所有事物提供通信能力以便这些设备能够以智能方式直接在它们之间进行通信从而消除了人为干预的需要这种通信是通过使用RFID标签传感器等建立的这些标签传感器等具有唯一标识的地址并能够相互通信物联网的主要问题是提供安全和隐私在众多用于设备间通信的无线技术中射频识别技术是最流行和应用最广泛的技术在尺寸重量能耗等方面的各种优势导致了该技术的流行因此本文主要研究RFID及其安全问题射频识别是一种无线通信技术很容易受到敌人的攻击和入侵因此我们必须开发强大的认证算法以提供最大的安全性使这项技术可以用于物联网的实现但问题是就内存和计算能力而言,RFID标签包含的标签资源非常少开发使用最少标记资源和提供最大安全性的身份验证协议是非常困难的因此我们的目标是开发轻量级身份验证协议该协议使用诸如XOR、Rot等更简单的操作这些操作旨在消耗很少的标记资源提供最大的安全性

 

Internet of Things (IoT) is a rapidly growing technology that is gaining importance in the area of ubiquitous computing. The main aim behind this concept is to provide communication capabilities to all the things present around us, so that these devices can communicate directly among themselves in an intelligent manner eliminating the need for human intervention. This communication is established by the use of RFID tags, sensors etc., which are provided with addresses to be uniquely identified and to communicate with each other. The main problem with IoT is providing security and privacy. Among many wireless technologies used for communication among devices, RFID technology is the most popular and widely used. Various factors like reduction in terms of size, weight, energy consumption lead to its popularity. So, in this thesis we mainly concentrate on RFID and its security problems. Since, RFID is a wireless communication technology; it is very easily prone to attacks and intrusions from the adversaries. So, we have to develop strong authentication algorithms which provide maximum security so that this technology can be used for the implementation of Internet of Things. But, the problem is that, RFID tags consist of very low tag resources in terms of memory and computational capabilities. It is very difficult to develop authentication protocols that consume minimum tag resources and provide maximum security. So, our goal is to develop lightweight authentication protocols which use simpler operations like XOR, Rot etc. which consumes very few tag resources and aims to provide maximum security.

 

引言

文献综述

本文进行的研究工作

仿真与结果验证

结论 


下载英文原文地址:

http://page2.dfpan.com/fs/fl8c2j726231e269169/ 


更多精彩文章请关注微信号:qrcode_for_gh_60b944f6c215_258.jpg



https://blog.sciencenet.cn/blog-69686-1180782.html

上一篇:[转载]【新书推荐】【2019.05】雷达网络与电子战系统中的光子学
下一篇:[转载]【图片新闻】80万美元一枚的LRLAP炮弹让朱姆沃尔特级驱逐舰“心力交瘁”
收藏 IP: 111.38.170.*| 热度|

0

该博文允许注册用户评论 请点击登录 评论 (0 个评论)

数据加载中...
扫一扫,分享此博文

Archiver|手机版|科学网 ( 京ICP备07017567号-12 )

GMT+8, 2024-9-23 15:49

Powered by ScienceNet.cn

Copyright © 2007- 中国科学报社

返回顶部